bump(metadata/glsa): sync with upstream

This commit is contained in:
David Michael 2017-05-08 11:42:19 -07:00
parent bfb3066a52
commit 917dcedec8
14 changed files with 356 additions and 29 deletions

View File

@ -13,7 +13,7 @@
<bug>46246</bug>
<access>remote</access>
<affected>
<package name="media-video/mplayer" auto="yes" arch="x86 and sparc">
<package name="media-video/mplayer" auto="yes" arch="x86 sparc">
<unaffected range="ge">0.92-r1</unaffected>
<vulnerable range="le">0.92</vulnerable>
</package>

View File

@ -16,7 +16,7 @@
<bug>133524</bug>
<access>remote</access>
<affected>
<package name="dev-lang/php" auto="yes" arch="arm hppa ppc s390 sh sparc x86 x86-fbsd">
<package name="dev-lang/php" auto="yes" arch="arm hppa ppc s390 sh sparc x86">
<unaffected range="ge">5.1.4</unaffected>
<unaffected range="rge">4.4.2-r2</unaffected>
<unaffected range="rge">4.4.3-r1</unaffected>

View File

@ -6,8 +6,8 @@
execution of arbitrary code.
</synopsis>
<product type="ebuild">tftp-hpa</product>
<announced>June 21, 2012</announced>
<revised>June 21, 2012: draft</revised>
<announced>2012-06-21</announced>
<revised>2017-04-17: 3</revised>
<bug>374001</bug>
<access>remote</access>
<affected>
@ -44,8 +44,6 @@
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2199">CVE-2011-2199</uri>
</references>
<metadata timestamp="Fri, 07 Oct 2011 23:37:00 +0000" tag="requester">
underling
</metadata>
<metadata timestamp="Thu, 21 Jun 2012 18:54:51 +0000" tag="submitter">craig</metadata>
<metadata tag="requester" timestamp="2011-10-07T23:37:00Z">underling</metadata>
<metadata tag="submitter" timestamp="2017-04-17T18:08:16Z">craig</metadata>
</glsa>

View File

@ -6,8 +6,8 @@
attack.
</synopsis>
<product type="ebuild"></product>
<announced>June 26, 2016</announced>
<revised>June 26, 2016: 1</revised>
<announced>2016-06-26</announced>
<revised>2017-04-17: 2</revised>
<bug>564774</bug>
<access>local</access>
<affected>
@ -26,8 +26,8 @@
<description>
<p>sudoedit in sudo is vulnerable to the escalation of privileges by local
users via a symlink attack. This can be exploited by a file whose full
path is defined using multiple wildcards in /etc/sudoers, as demonstrated
by “/home/<em>/</em>/file.txt.
path is defined using multiple wildcards in /etc/sudoers, as
demonstrated by “/home/*/*/file.txt”.
</p>
</description>
<impact type="normal">
@ -49,8 +49,6 @@
CVE-2015-5602
</uri>
</references>
<metadata tag="requester" timestamp="Wed, 23 Dec 2015 23:28:50 +0000">
BlueKnight
</metadata>
<metadata tag="submitter" timestamp="Sun, 26 Jun 2016 13:48:21 +0000">b-man</metadata>
<metadata tag="requester" timestamp="2015-12-23T23:28:50Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-04-17T18:04:03Z">b-man</metadata>
</glsa>

View File

@ -7,8 +7,8 @@
code.
</synopsis>
<product type="ebuild"></product>
<announced>November 04, 2016</announced>
<revised>November 04, 2016: 1</revised>
<announced>2016-11-04</announced>
<revised>2017-04-17: 2</revised>
<bug>565026</bug>
<bug>587566</bug>
<access>remote</access>
@ -59,14 +59,14 @@
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=app-office/libreoffice-5.1.4.2"
# emerge --ask --oneshot --verbose
"&gt;=app-office/libreoffice-bin-debug-5.1.4.2" <code></code>
"&gt;=app-office/libreoffice-bin-debug-5.1.4.2"
</code>
<p>All OpenOffice users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-4.1.2"<code></code>
# emerge --ask --oneshot --verbose "&gt;=app-office/openoffice-bin-4.1.2"
</code>
</resolution>
<references>
@ -84,8 +84,6 @@
</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4324">CVE-2016-4324</uri>
</references>
<metadata tag="requester" timestamp="Sat, 10 Sep 2016 07:32:58 +0000">
BlueKnight
</metadata>
<metadata tag="submitter" timestamp="Fri, 04 Nov 2016 07:55:31 +0000">b-man</metadata>
<metadata tag="requester" timestamp="2016-09-10T07:32:58Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-04-17T17:52:18Z">b-man</metadata>
</glsa>

View File

@ -7,7 +7,8 @@
</synopsis>
<product type="ebuild">libraw</product>
<announced>2017-01-24</announced>
<revised>2017-01-24: 1</revised>
<revised>2017-04-30: 2</revised>
<bug>549338</bug>
<bug>567254</bug>
<access>local, remote</access>
<affected>
@ -43,9 +44,10 @@
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3885">CVE-2015-3885</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8366">CVE-2015-8366</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8367">CVE-2015-8367</uri>
</references>
<metadata tag="requester" timestamp="2017-01-18T08:14:05Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-01-24T10:53:14Z">b-man</metadata>
<metadata tag="submitter" timestamp="2017-04-30T20:28:16Z">b-man</metadata>
</glsa>

View File

@ -8,7 +8,8 @@
</synopsis>
<product type="ebuild">chromium</product>
<announced>2017-04-10</announced>
<revised>2017-04-10: 1</revised>
<revised>2017-04-14: 2</revised>
<bug>612190</bug>
<bug>614276</bug>
<access>remote</access>
<affected>
@ -45,6 +46,23 @@
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5030">CVE-2017-5030</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5031">CVE-2017-5031</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5032">CVE-2017-5032</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5033">CVE-2017-5033</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5034">CVE-2017-5034</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5035">CVE-2017-5035</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5036">CVE-2017-5036</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5037">CVE-2017-5037</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5038">CVE-2017-5038</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5039">CVE-2017-5039</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5040">CVE-2017-5040</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5041">CVE-2017-5041</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5042">CVE-2017-5042</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5043">CVE-2017-5043</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5044">CVE-2017-5044</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5045">CVE-2017-5045</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5046">CVE-2017-5046</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5052">CVE-2017-5052</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5053">CVE-2017-5053</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5054">CVE-2017-5054</uri>
@ -52,5 +70,5 @@
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5056">CVE-2017-5056</uri>
</references>
<metadata tag="requester" timestamp="2017-04-02T12:37:12Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-04-10T21:28:37Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-04-14T15:04:47Z">BlueKnight</metadata>
</glsa>

View File

@ -0,0 +1,58 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201704-04">
<title>Adobe Flash Player: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">adobe-flash</product>
<announced>2017-04-27</announced>
<revised>2017-04-27: 2</revised>
<bug>615244</bug>
<access>remote</access>
<affected>
<package name="www-plugins/adobe-flash" auto="yes" arch="*">
<unaffected range="ge">25.0.0.148</unaffected>
<vulnerable range="lt">25.0.0.148</vulnerable>
</package>
</affected>
<background>
<p>The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in Adobe Flash Player.
Please review the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could possibly execute arbitrary code with the
privileges of the process or bypass security restrictions.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Adobe Flash users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose
"&gt;=www-plugins/adobe-flash-25.0.0.148"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3058">CVE-2017-3058</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3059">CVE-2017-3059</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3060">CVE-2017-3060</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3061">CVE-2017-3061</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3062">CVE-2017-3062</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3063">CVE-2017-3063</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3064">CVE-2017-3064</uri>
</references>
<metadata tag="requester" timestamp="2017-04-13T15:19:39Z">whissi</metadata>
<metadata tag="submitter" timestamp="2017-04-27T05:32:52Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,59 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201705-01">
<title>libevent: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in libevent, the worst of
which allows remote attackers to execute arbitrary code.
</synopsis>
<product type="ebuild">libevent</product>
<announced>2017-05-07</announced>
<revised>2017-05-07: 1</revised>
<bug>608042</bug>
<access>remote</access>
<affected>
<package name="dev-libs/libevent" auto="yes" arch="*">
<unaffected range="ge">2.1.7_rc</unaffected>
<vulnerable range="lt">2.1.7_rc</vulnerable>
</package>
</affected>
<background>
<p>libevent is a library to execute a function when a specific event occurs
on a file descriptor.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in libevent. Please review
the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could possibly execute arbitrary code with the
privileges of the process, or cause a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All libevent users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-libs/libevent-2.1.7_rc"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10195">
CVE-2016-10195
</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10196">
CVE-2016-10196
</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10197">
CVE-2016-10197
</uri>
</references>
<metadata tag="requester" timestamp="2017-04-27T05:45:34Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-07T20:14:35Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,65 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201705-02">
<title>Chromium: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in the Chromium web
browser, the worst of which allows remote attackers to execute arbitrary
code.
</synopsis>
<product type="ebuild">chromium</product>
<announced>2017-05-07</announced>
<revised>2017-05-07: 1</revised>
<bug>616048</bug>
<access>remote</access>
<affected>
<package name="www-client/chromium" auto="yes" arch="*">
<unaffected range="ge">58.0.3029.81</unaffected>
<vulnerable range="lt">58.0.3029.81</vulnerable>
</package>
</affected>
<background>
<p>Chromium is an open-source browser project that aims to build a safer,
faster, and more stable way for all users to experience the web.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in the Chromium web
browser. Please review the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, bypass security restrictions or spoof content.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Chromium users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose
"&gt;=www-client/chromium-58.0.3029.81"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5057">CVE-2017-5057</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5058">CVE-2017-5058</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5059">CVE-2017-5059</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5060">CVE-2017-5060</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5061">CVE-2017-5061</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5062">CVE-2017-5062</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5063">CVE-2017-5063</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5064">CVE-2017-5064</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5065">CVE-2017-5065</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5066">CVE-2017-5066</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5067">CVE-2017-5067</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5069">CVE-2017-5069</uri>
</references>
<metadata tag="requester" timestamp="2017-04-28T01:40:34Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-07T20:15:34Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,75 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201705-03">
<title>Oracle JDK/JRE: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in Oracle's JRE and JDK
software suites, the worst of which may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">jre,jdk,oracle</product>
<announced>2017-05-07</announced>
<revised>2017-05-07: 1</revised>
<bug>616050</bug>
<access>remote</access>
<affected>
<package name="dev-java/oracle-jre-bin" auto="yes" arch="*">
<unaffected range="ge">1.8.0.131</unaffected>
<vulnerable range="lt">1.8.0.131</vulnerable>
</package>
<package name="dev-java/oracle-jdk-bin" auto="yes" arch="*">
<unaffected range="ge">1.8.0.131</unaffected>
<vulnerable range="lt">1.8.0.131</vulnerable>
</package>
</affected>
<background>
<p>Java Platform, Standard Edition (Java SE) lets you develop and deploy
Java applications on desktops and servers, as well as in todays
demanding embedded environments. Java offers the rich user interface,
performance, versatility, portability, and security that todays
applications require.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in in Oracles JRE and
JDK. Please review the CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could possibly execute arbitrary code with the
privileges of the process, gain access to information, or cause a Denial
of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Oracle JRE users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose
"&gt;=dev-java/oracle-jre-bin-1.8.0.131"
</code>
<p>All Oracle JDK users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose
"&gt;=dev-java/oracle-jdk-bin-1.8.0.131"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3509">CVE-2017-3509</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3511">CVE-2017-3511</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3512">CVE-2017-3512</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3514">CVE-2017-3514</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3526">CVE-2017-3526</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3533">CVE-2017-3533</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3539">CVE-2017-3539</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3544">CVE-2017-3544</uri>
</references>
<metadata tag="requester" timestamp="2017-04-28T06:54:02Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-07T20:16:21Z">whissi</metadata>
</glsa>

View File

@ -0,0 +1,55 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201705-04">
<title>Mozilla Network Security Service (NSS): Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in NSS, the worst of which
may allow execution of arbitrary code.
</synopsis>
<product type="ebuild">nss</product>
<announced>2017-05-07</announced>
<revised>2017-05-07: 1</revised>
<bug>616032</bug>
<bug>616036</bug>
<access>remote</access>
<affected>
<package name="dev-libs/nss" auto="yes" arch="*">
<unaffected range="ge">3.29.5</unaffected>
<vulnerable range="lt">3.29.5</vulnerable>
</package>
</affected>
<background>
<p>The Mozilla Network Security Service (NSS) is a library implementing
security features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS
#12, S/MIME and X.509 certificates.
</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in NSS. Please review the
CVE identifiers referenced below for details.
</p>
</description>
<impact type="normal">
<p>A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, or view
sensitive information.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All NSS users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-libs/nss-3.29.5"
</code>
</resolution>
<references>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5461">CVE-2017-5461</uri>
<uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5462">CVE-2017-5462</uri>
</references>
<metadata tag="requester" timestamp="2017-04-30T13:52:41Z">BlueKnight</metadata>
<metadata tag="submitter" timestamp="2017-05-07T20:17:08Z">whissi</metadata>
</glsa>

View File

@ -1 +1 @@
Tue, 11 Apr 2017 18:09:39 +0000
Mon, 08 May 2017 18:09:03 +0000

View File

@ -0,0 +1 @@
897a88bc971653dc30260f5432ee7d29adee1c07 1494188470 2017-05-07T20:21:10+00:00